Status

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Systems using AMD CPUs are not vulnerable to this privilege escalation. AMD have issued the following statement:

AMD processors' SYSRET behavior is such that a non-canonical address in RCX does not generate a #GP while in CPL0. We have verified this with our architecture team, with our design team, and have performed tests that verified this on silicon. Therefore, this privilege escalation exposure is not applicable to any AMD processor.

This statement comes from the Xen security advisory.

Vendor References

None

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.